QUESTION 31After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?

A. Run the malware removal program while disconnected from the InternetB. Run the malware removal program in Windows Safe ModeC. Reinstall the malware removal program from a trusted sourceD. Set the malware removal program to run each time the computer is rebooted

QUESTION 32A user, Joe, calls and states every few hours he is unable to connect to the Internet for several minutes but is able to access internal sites during this time. Which of the following tools would be used to find the issue with the network connection?

QUESTION 33A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).

A. Configure the workstation for a static IPB. Disable all wireless network connectionsC. Remove shortcuts to the applicationD. Block the application in Windows FirewallE. Change network location to WorkF. Reroute the web address in HOSTS file

Answer: DFExplanation:Use Windows firewall to restrict an application from reaching the web. Alternatively you can also reroute the web address in the HOST file.

QUESTION 34For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?

QUESTION 38A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access?

A. Turning down the radio power levelB. Enabling MAC filteringC. Setting a high encryption levelD. Disabling the SSID broadcast

QUESTION 39A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone’s knowledge. Which of the following would prevent this from occurring?

QUESTION 40A technician has configured the ability to connect to a small office server using remote desktopfrom a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?

A. Configure the server to use a static IPB. Logically move the server to the DMZC. Reallocate the server to a different networking closetD. Disable the remote desktop port